
Publications
Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.
Publication Date | Title | Tags |
---|---|---|
October 20, 2014 |
Multiparty Verified Code Execution on Modern Browsers
A process that allows a user to securely execute a web application without trusting a single server. |
security Multiparty Verified Verification Code Execution Javascript Web Application Browser Secure Distributed Cryptography Bookmark Bookmarklet |
September 05, 2014 |
Token-Based Multiparty Password Authenticated Key Retrieval Process
This is a process that allows a user to retrieve a secret key with the help of multiple independent servers. |
security Multiparty Secure Distributed Cryptography authentication password Authenticated Key Retrieval PAKR Secret Token |
May 14, 2014 |
Improved password based solution for authentication and authorization
The idea proposed will provide improved secure password handling that is possible to map onto legacy hardware and procedures, only requiring a secure domain for the user password database management and moderate modifications of the legacy software. |
security password protected database trusted platform module |
April 07, 2014 |
Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before. |
security visualization Linux FreeBSD BSD Unix QNX Solaris ELF software software development dynamic linking open source license compliance defect discovery reverse engineering |
April 22, 2010 |
Secure Management of Objects in Remote Containers Shared by Multiple and Independent Issuers
The specification describes how objects issued by different issuers but stored in a single container can securely be managed by each issuer in a remote fashion. |
security mobile phones |
August 19, 2009 |
Kernel Based User Authentication
The Security Sector prevents the execution of system commands unless the user can be authenticated by the Security Sector. |
security kernel |
June 23, 2009 |
File Access Management with Secure Hardware
A system is needed that not only manages all access to secure files, but also limits which devices may have access to the file itself. |
security information |
June 16, 2009 |
VPN Sales System
Needed is a means of conducting transactions over a secure network such that internet and website security are not topics of concern. |
security transactions |
March 11, 2009 |
Method of Providing Anonymous Secure User Access Tokens
While passwords provide some protection, a skilled individual can intercept data such as usernames and passwords and gain access to the data. |
security access |
January 29, 2009 |
Method for Efficiently and Securely Purchasing Goods from Online Services
Online purchasing transactions cannot always be counted on to be secure. In this invention, Linux gets involved in both ends of the transmission of secure transactions: Linux must be running on both the local computer where the transaction originates and on the online service’s server. |
security online transactions encryption key |